blog.michaeltech.xyzHow to create your private VPN on the cloudBackground As the world around us gets more and more intertwined with the World Wide Web, the need to secure our Internet experience has never been more important than ever. With the rise of IOT (Internet of Things), we are seeing an increasingly dig...Sep 20, 2023·3 min read
blog.michaeltech.xyzUnderstanding How Staking works on EthereumOne of the key components of a blockchain is the ability to carry out a trustless consensus mechanism to verify transactions, the traditional means of validating transactions has been the Proof-Of-Stake mechanism which requires that for every transac...May 23, 2023·3 min read
blog.michaeltech.xyzReentrancy Attack in SolidityWith the rise of web3, we have seen financial solutions taking advantage of the blockchain to deliver innovative products and services, this has also brought about an accompanying rise of malicious actors and hackers seeking to find exploits in sever...Mar 30, 2023·3 min read
blog.michaeltech.xyzUsing WebSocket to build a Real-time Cryptocurrency TrackerIn building web applications, the underlying communication architecture plays a vital role in determining the effectiveness of its functionalities. WebSocket is a TCP/IP communication protocol that allows for a consistent bidirectional(two-way )excha...Mar 15, 2023·4 min read
blog.michaeltech.xyzHow to Create an NFT TokenNFT(Non-Fungible Tokens) are tokens used to represent digital assets with inherent properties that are unique and that cannot be exchanged or interchanged(fungible), in many cases, they are used to represent items like images, art, etc. The Ethereum ...Feb 27, 2023·5 min read